全文获取类型
收费全文 | 229篇 |
免费 | 15篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 50篇 |
机械仪表 | 13篇 |
建筑科学 | 4篇 |
矿业工程 | 1篇 |
能源动力 | 5篇 |
轻工业 | 51篇 |
水利工程 | 1篇 |
石油天然气 | 1篇 |
无线电 | 32篇 |
一般工业技术 | 33篇 |
冶金工业 | 9篇 |
原子能技术 | 1篇 |
自动化技术 | 43篇 |
出版年
2024年 | 5篇 |
2023年 | 16篇 |
2022年 | 18篇 |
2021年 | 23篇 |
2020年 | 16篇 |
2019年 | 20篇 |
2018年 | 16篇 |
2017年 | 13篇 |
2016年 | 21篇 |
2015年 | 11篇 |
2014年 | 14篇 |
2013年 | 18篇 |
2012年 | 10篇 |
2011年 | 10篇 |
2010年 | 5篇 |
2009年 | 5篇 |
2008年 | 2篇 |
2006年 | 5篇 |
2005年 | 3篇 |
2004年 | 1篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 2篇 |
1997年 | 2篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1988年 | 1篇 |
排序方式: 共有245条查询结果,搜索用时 46 毫秒
41.
42.
Brian G. Thomas Quan Yuan Sana Mahmood Rui Liu Rajneesh Chaudhary 《Metallurgical and Materials Transactions B》2014,45(1):22-35
A particle-capture model based on local force balances has been developed, implemented into computational models of turbulent fluid flow and particle transport, and applied to simulate the entrapment of slag inclusions and bubbles during the continuous casting of steel slabs. Turbulent flow of molten steel is computed in the nozzle and mold using transient computational fluid flow models, both with and without the effects of argon gas injection. Next, the transport and capture of many particles are simulated using a Lagrangian approach. Particles touching the dendritic interface may be pushed away, dragged away by the transverse flow, or captured into the solidifying shell according to the results of a local balance of ten different forces. This criterion was validated by reproducing experimental results in two different systems. The implications of this criterion are discussed quantitatively. Finally, the fluid flow/particle transport model results and capture criterion are applied together to predict the entrapment distributions of different sized particles in a typical slab caster. More large particles are safely removed than small ones, but the entrapment rate into the solidifying shell as defects is still very high. 相似文献
43.
1. IntroductionMany studies have been devoted to the inhibitionof steel i. acidic media by organic compounds[1-3],but indole and its derivatives have been relativelylittle studiedl4'5]. The chemical structure of the inhibitor molecules plays a significant role and often determines whether or not a compound will effectivelyinhibit a specific system.The present work has been carried out to investigate the inhibiting effect of indole and some of itsderivatives on the corrosion inhibition of C-ste… 相似文献
44.
Jia Shi Riku Kanoya Yurina Tani Sodai Ishikawa Rino Maeda Sana Suzuki Fumiya Kawanami Naoko Miyagawa Katsuhiko Takahashi Teruaki Oku Ami Yamamoto Kaori Fukuzawa Motowo Nakajima Tatsuro Irimura Nobuaki Higashi 《International journal of molecular sciences》2022,23(9)
We examined whether sulfated hyaluronan exerts inhibitory effects on enzymatic and biological actions of heparanase, a sole endo-beta-glucuronidase implicated in cancer malignancy and inflammation. Degradation of heparan sulfate by human and mouse heparanase was inhibited by sulfated hyaluronan. In particular, high-sulfated hyaluronan modified with approximately 2.5 sulfate groups per disaccharide unit effectively inhibited the enzymatic activity at a lower concentration than heparin. Human and mouse heparanase bound to immobilized sulfated hyaluronan. Invasion of heparanase-positive colon-26 cells and 4T1 cells under 3D culture conditions was significantly suppressed in the presence of high-sulfated hyaluronan. Heparanase-induced release of CCL2 from colon-26 cells was suppressed in the presence of sulfated hyaluronan via blocking of cell surface binding and subsequent intracellular NF-κB-dependent signaling. The inhibitory effect of sulfated hyaluronan is likely due to competitive binding to the heparanase molecule, which antagonizes the heparanase-substrate interaction. Fragment molecular orbital calculation revealed a strong binding of sulfated hyaluronan tetrasaccharide to the heparanase molecule based on electrostatic interactions, particularly characterized by interactions of (−1)- and (−2)-positioned sulfated sugar residues with basic amino acid residues composing the heparin-binding domain-1 of heparanase. These results propose a relevance for sulfated hyaluronan in the blocking of heparanase-mediated enzymatic and cellular actions. 相似文献
45.
Two‐echelon manufacturer–retailer supply chain strategies with price,quality, and promotional effort sensitive demand
下载免费PDF全文
![点击此处可从《International Transactions in Operational Research》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Brojeswar Pal Shib Sankar Sana Kripasindhu Chaudhuri 《International Transactions in Operational Research》2015,22(6):1071-1095
This study deals with the two‐layer supply chain model of one manufacturer and one retailer for a single commodity where market demand is assumed to be dependent on selling price, quality of the products, and promotional effort of the retailer. We investigate the behavior of the supply chain under centralized, manufacturer Stackelberg, conditional manufacturer Stackelberg, retailer Stackelberg, conditional retailer Stackelberg, and vertical Nash model structure. The nature of the above models provides great insights to a firm's manager for achieving optimal strategy in a competitive marketing system. Quite often, not all items produced in a firm are of perfect quality; some are perfect (conforming) quality and others are imperfect (nonconforming) quality. The nonconforming products are sold in a secondary shop or by other retailers. The procurement cost of finished products depends on the quality of the products due to more investment in advanced technology, better raw materials, and skilled labor, etc. The warranty policy for the products is also imposed to attract the customers to buy more. Here, both members (manufacturer and retailer) jointly share the cost of the warranty policy. The objective of this paper is to determine the optimal selling price and promotional effort of the retailer, while the optimal wholesale price and quality of the products are determined by the manufacturer so that the above strategies are maximized. Finally, numerical examples with sensitivity analysis of the key parameters are illustrated to investigate the proposed model. 相似文献
46.
47.
Asad Nawaz Shinawar Waseem Ali Sana Irshad Fatima Irshad Aftab Ahmed Zainab Sharmeen Imran Khan 《International Journal of Food Science & Technology》2020,55(6):2344-2351
The current study investigates the comparison and quality characteristics of starches isolated from potatoes using different processing methods from three commercial varieties: Lady Rosetta, Asterix and Challenger, for the first time in Pakistan. The analysis of variance revealed that starch yield significantly (P < 0.05) depended on total solids, peeling (12.7%, 12.0% and 12.0%) and unpeeling (15.0%, 14.0% and 14.0%) of potatoes compared to potato varieties for Lady Rosetta, Challenger and Asterix, respectively. Moreover, pasting properties, protein content, redness and yellowness were increased in those starches isolated without peeling while carbohydrates and lightness were increased in peeled potato starches. Furthermore, Fourier-transform infrared spectroscopy analysis revealed that protein (1200–1400 cm−1) was present in starch extracted without peeling. Besides, scanning electron microscopy analysis revealed oval-shaped starch granules with no impurities in peeled potato starch. The findings suggest the suitability of peeling process for obtaining a high-quality pure starch. 相似文献
48.
Sana Ben Hamida Hichem Mrabet Sana Belguith Adeeb Alhomoud Abderrazak Jemai 《计算机、材料和连续体(英文)》2022,70(3):4897-4907
From fraud detection to speech recognition, including price prediction, Machine Learning (ML) applications are manifold and can significantly improve different areas. Nevertheless, machine learning models are vulnerable and are exposed to different security and privacy attacks. Hence, these issues should be addressed while using ML models to preserve the security and privacy of the data used. There is a need to secure ML models, especially in the training phase to preserve the privacy of the training datasets and to minimise the information leakage. In this paper, we present an overview of ML threats and vulnerabilities, and we highlight current progress in the research works proposing defence techniques against ML security and privacy attacks. The relevant background for the different attacks occurring in both the training and testing/inferring phases is introduced before presenting a detailed overview of Membership Inference Attacks (MIA) and the related countermeasures. In this paper, we introduce a countermeasure against membership inference attacks (MIA) on Conventional Neural Networks (CNN) based on dropout and L2 regularization. Through experimental analysis, we demonstrate that this defence technique can mitigate the risks of MIA attacks while ensuring an acceptable accuracy of the model. Indeed, using CNN model training on two datasets CIFAR-10 and CIFAR-100, we empirically verify the ability of our defence strategy to decrease the impact of MIA on our model and we compare results of five different classifiers. Moreover, we present a solution to achieve a trade-off between the performance of the model and the mitigation of MIA attack. 相似文献
49.
A. M. Sana F. A. Moustafa A. A. El-Sharkawy A. G. Mostafa A. A. El-Saghier I. Kashif 《Journal of Materials Science》1988,23(5):1553-1557
The conductivities of lithium borosilicate glasses containing 2.5 mol % V2O5, MnO, Cr2O3, Fe2O3 and CoO were measured for untreated and heat-treated glasses (for 5 h at 480, 580 and 680°C). Both IR and X-ray diffraction techniques were used to investigate the microstructure of these glasses before and after heat-treatment. Lithium metasilicate and lithium metaborate were the main separated phases in addition to lithium disilicate in samples containing Fe2O3. The silicon ions are coordinated to four oxygens in tetrahedral coordination and some borons changed from triangular to tetrahedral. 相似文献
50.
Sana Ben Jamaa Zwi Altman Jean-Marc Picard Benoît Fourestié Julien Mourlon 《Mobile Networks and Applications》2004,9(6):619-626
This paper describes manual and automatic design strategies of UMTS networks. The design aims at adjusting antenna parameters: antenna pattern, tilt and azimuth angles, as well as the common channels' transmitted power to improve the network performance in terms of coverage, capacity, quality of service and service continuity. The manual design strategy is based on an expert system that analyzes different quality criteria of the network and suggests the designer the most effective parameter modifications. The automatic design strategy is based on a Genetic Algorithm that orchestrates the design process. Two optimisation models are considered: the first one uses constant load hypotheses in the network evaluation; the second one takes into account inhomogeneous traffic distribution and utilizes accurate modelling of basic UMTS quantities such as power, load and interference. Detailed examples of network optimization illustrate the effectiveness of the design strategies. 相似文献